“Every day, a growing number of people log in to Twitter. Usually these login attempts come from the genuine account owners, but we occasionally hear from people whose accounts have been compromised by email phishing schemes or a breach of password data elsewhere on the web.”
May 24, 2013
Getting started with login verification
By Andre Simms
About Andre Simms
Professional Ever since I was a child, my interests have always been in discovering how things work. By breaking down complex operations into their smaller components, I've grown to appreciate how things work together; finding more efficient ways of completing tasks is a creative challenge that I enjoy. Recently, I earned my bachelor's degree in Political Science at the University of Wisconsin-Milwaukee, with a focus on American politics and public administration. I now work as a government professional with 3 years experience in both executive and legislative work. Many of my skills have grown from my experiences of studying problems in government operation, critical analysis and complex problem solving. Personal I am an avid photographer, and have been actively shooting for 10 years. My style has grown to focus on lifestyle photography; I love capturing my everyday experiences through the lenses of my camera. While I enjoy many types of photography, my favorite method is the long exposure. This method, when applied at night allows colors to saturate themselves in an unique way. At night, the world we are familiar with transforms into a new place, the night world is a reflection of the day. View all posts by Andre Simms
This entry was posted on Friday, May 24th, 2013 at 7:42 am and tagged with IFTTT, Pocket and posted in Social. You can follow any responses to this entry through the RSS 2.0 feed.